Security Basics mailing list archives

RE: Firewall and DMZ topology


From: "DeGennaro, Gregory" <Gregory_DeGennaro () csaa com>
Date: Tue, 10 Jun 2003 13:06:57 -0700

I agree, a single tri-homed firewall sounds too risky by itself.


I like this config 

[router]---[Outer firewall/IDS]---[DMZ]---[Inner firewall/IDS(optional but
recommended or HIDS on the LAN)]---[LAN]


-----Original Message-----
From: Depp, Dennis M. [mailto:deppdm () ornl gov] 
Sent: Tuesday, June 10, 2003 11:41 AM
To: Chris Berry; security-basics () securityfocus com
Subject: RE: Firewall and DMZ topology

I'm not sure how a tri-homed firewall can be just as secure as a two
firewall setup.  Consider this:

Hacker is able to penetrate your firewall and "owns" the box.  In a
tri-homed firewall, they now have direct access to your internal
network.  If this had been a two firewall setup, they would have to
compromise the second box as well.  While this may not be an issue as
they were already sucessful in owning one firewall, hopefully you have
your intrusion detection system tuned to a greater degree of sensativity
in your DMZ.  And you will be able to discover this second attempt.

I do think tri-homed firewalls are a good solution, but they are not as
secure as a two firewall solution.

Dennis Depp 


---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.
     
Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.
          
Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------


Current thread: